Enviar pesquisa
Carregar
Architect Infrastructure in Azure
•
Transferir como PPTX, PDF
•
0 gostou
•
216 visualizações
Título melhorado com IA
Y
Yoong Seng Lai
Seguir
Flash Card Architect Infrastructure Operation in Azure
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 16
Baixar agora
Recomendados
Flash card Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in Azure
Yoong Seng Lai
Flash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in Azure
Yoong Seng Lai
Flash Card-Architect Compute Infrastructure in Azure
Flash Card-Architect Compute Infrastructure in Azure
Yoong Seng Lai
Flash card Module 12-Administer Container in Azure
Flash card Module 12-Administer Container in Azure
Yoong Seng Lai
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Yoong Seng Lai
Flash Card : Manage Resources in Azure
Flash Card : Manage Resources in Azure
Yoong Seng Lai
Flash Card Module 10-Implement Resource Management Security in Azure
Flash Card Module 10-Implement Resource Management Security in Azure
Yoong Seng Lai
Flash card architect network infra in azure
Flash card architect network infra in azure
Yoong Seng Lai
Recomendados
Flash card Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in Azure
Yoong Seng Lai
Flash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in Azure
Yoong Seng Lai
Flash Card-Architect Compute Infrastructure in Azure
Flash Card-Architect Compute Infrastructure in Azure
Yoong Seng Lai
Flash card Module 12-Administer Container in Azure
Flash card Module 12-Administer Container in Azure
Yoong Seng Lai
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Yoong Seng Lai
Flash Card : Manage Resources in Azure
Flash Card : Manage Resources in Azure
Yoong Seng Lai
Flash Card Module 10-Implement Resource Management Security in Azure
Flash Card Module 10-Implement Resource Management Security in Azure
Yoong Seng Lai
Flash card architect network infra in azure
Flash card architect network infra in azure
Yoong Seng Lai
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Yoong Seng Lai
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Yoong Seng Lai
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Amazon Web Services
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Amazon Web Services
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Amazon Web Services
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
Hayato Kiriyama
Flash card introduction to azure vm
Flash card introduction to azure vm
Yoong Seng Lai
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
Amazon Web Services
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
Securing AWS Environments
Securing AWS Environments
Ashish Kaushik
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
Amazon Web Services
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
Amazon Web Services
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Amazon Web Services
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Amazon Web Services
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Amazon Web Services
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Amazon Web Services
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Amazon Web Services
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Amazon Web Services
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Amazon Web Services
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Amazon Web Services
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
OW2
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...
Amazon Web Services
Mais conteúdo relacionado
Mais procurados
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Yoong Seng Lai
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Yoong Seng Lai
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Amazon Web Services
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Amazon Web Services
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Amazon Web Services
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
Hayato Kiriyama
Flash card introduction to azure vm
Flash card introduction to azure vm
Yoong Seng Lai
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
Amazon Web Services
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
Securing AWS Environments
Securing AWS Environments
Ashish Kaushik
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
Amazon Web Services
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
Amazon Web Services
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Amazon Web Services
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Amazon Web Services
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Amazon Web Services
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Amazon Web Services
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Amazon Web Services
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Amazon Web Services
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Amazon Web Services
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Amazon Web Services
Mais procurados
(20)
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
Flash card introduction to azure vm
Flash card introduction to azure vm
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Securing AWS Environments
Securing AWS Environments
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Semelhante a Architect Infrastructure in Azure
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
OW2
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...
Amazon Web Services
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Amazon Web Services
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Amazon Web Services
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
Amazon Web Services
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Amazon Web Services
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Amazon Web Services
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Amazon Web Services
Amazon CloudWatch (Container Insights)- AWS Container Day 2019 Barcelona
Amazon CloudWatch (Container Insights)- AWS Container Day 2019 Barcelona
Amazon Web Services
Security in the cloud
Security in the cloud
Reham Maher El-Safarini
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
Amazon Web Services
AWS Initiate: Security framework shakedown
AWS Initiate: Security framework shakedown
Amazon Web Services LATAM
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
Amazon Web Services LATAM
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
AppDynamics
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...
Amazon Web Services
Security and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
Kaseya
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Combell NV
Security hardening of core AWS services
Security hardening of core AWS services
Runcy Oommen
Control your cloud environment with AWS management tools
Control your cloud environment with AWS management tools
Amazon Web Services
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up Loft
Amazon Web Services
Semelhante a Architect Infrastructure in Azure
(20)
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Amazon CloudWatch (Container Insights)- AWS Container Day 2019 Barcelona
Amazon CloudWatch (Container Insights)- AWS Container Day 2019 Barcelona
Security in the cloud
Security in the cloud
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
AWS Initiate: Security framework shakedown
AWS Initiate: Security framework shakedown
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...
Security and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Security hardening of core AWS services
Security hardening of core AWS services
Control your cloud environment with AWS management tools
Control your cloud environment with AWS management tools
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up Loft
Mais de Yoong Seng Lai
Flash card architect storage infrastructure in azure
Flash card architect storage infrastructure in azure
Yoong Seng Lai
Flash card security-azure disk
Flash card security-azure disk
Yoong Seng Lai
Flash card managing using azure cli
Flash card managing using azure cli
Yoong Seng Lai
Flash card caching and performance in azure storage disk
Flash card caching and performance in azure storage disk
Yoong Seng Lai
Flash card azure disk
Flash card azure disk
Yoong Seng Lai
Flash card azure automation state
Flash card azure automation state
Yoong Seng Lai
Extending Availability to the Cloud
Extending Availability to the Cloud
Yoong Seng Lai
Business Continuity with Disaster Recovery
Business Continuity with Disaster Recovery
Yoong Seng Lai
Mais de Yoong Seng Lai
(8)
Flash card architect storage infrastructure in azure
Flash card architect storage infrastructure in azure
Flash card security-azure disk
Flash card security-azure disk
Flash card managing using azure cli
Flash card managing using azure cli
Flash card caching and performance in azure storage disk
Flash card caching and performance in azure storage disk
Flash card azure disk
Flash card azure disk
Flash card azure automation state
Flash card azure automation state
Extending Availability to the Cloud
Extending Availability to the Cloud
Business Continuity with Disaster Recovery
Business Continuity with Disaster Recovery
Último
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Último
(20)
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Architect Infrastructure in Azure
1.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Flash Card – Architect Infrastructure Operation in Azure Prepared by Lai
2.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Resource Group Grouping By resources By environment By department
3.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Use Tag to organize resources Tag - Name/value pair For billing data Use Policies to enforce standard For monitoring Azure Policy – to create, assign & manage Create – Assignment- Secure resouces with RBAC Grant specific rights
4.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Use resource lock to protect resources Prevent mistaken deletion Block modification/ deletion Set Delete / Read only
5.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Policy
6.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Policy Focus on resource properties during deployment & already existing resources RBAC Focus on user action at different scopes Default Allow & Explicit deny Create Policy definition -> Assign definition to resources -> View result
7.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Management Group Container for managing access, policies & compliance across multiple Azure subscription
8.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Monitor Monitor Service Health Comprehensive solution for collecting, analyzing & acting on telemetry Application Insight- monitor availability, performance & sage of web app Azure monitor for container – monitor performance of container workload Azure monitor for VM – monitor performance VM Visualize monitoring data 1. Dashboard 2. View 3. Power BI
9.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Service Health Monitor Service Health Provide personalized guidance & support when issue Azure Status – provide global view of the health state of Azure Services Service health – customizable dashboard that track the status of Azure services Resource Health – diagnose & obtain support when azure service issue affect resources
10.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Design Monitoring Strategy
11.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Security Center Manage security of your infra from centralized location
12.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Application Insight Monitor & manage the performance of your application Install package to monitor app & send log to Log Analytic workspace Use continuous monitoring gateway to monitor release pipeline Use availability test to monitor app performance after it’s live
13.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Sentinel Collect data on devices, user, infra & application Have data connector to monitor
14.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Monitor Collecting metric & log data, combining & analyzing data from different sources
15.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Monitor
16.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Thank You
Baixar agora